Looks like it shows an infected JAR, and leaks info about a Gondvv.class which contains the actual malicious stuff.
There's an analysis here: http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html I've long felt pretty save on Linux, in spite of these Java vulnerabilities - not so anymore. Can anyone recommend a plugin a la FlashBlock but for Java, that requires active authorization of an applet before running it? /Casper On Monday, August 27, 2012 8:00:18 PM UTC+2, Ricky Clarkson wrote: > > Can anyone explain how the Wireshark screenshot relates to the > article's content? > > On Mon, Aug 27, 2012 at 2:01 PM, Ben Smith-Mannschott > <[email protected] <javascript:>> wrote: > > Just a heads-up: > > > > «A vulnerability in the latest version of Oracle's Java software > > framework is under active attack, and the damage is likely to get > > worse thanks to the availability of reliable exploit code that works > > on a variety of browsers and computer platforms, security experts > > warn.» > > > > > http://arstechnica.com/security/2012/08/critical-flaw-under-active-attack-prompts-calls-to-disable-java/ > > > > > (See article for full text) > > > > // ben > > > > -- > > You received this message because you are subscribed to the Google > Groups "Java Posse" group. > > To post to this group, send email to [email protected]<javascript:>. > > > To unsubscribe from this group, send email to > [email protected] <javascript:>. > > For more options, visit this group at > http://groups.google.com/group/javaposse?hl=en. > > > -- You received this message because you are subscribed to the Google Groups "Java Posse" group. To view this discussion on the web visit https://groups.google.com/d/msg/javaposse/-/ZAVob8bzRbYJ. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
